Sciweavers

1830 search results - page 356 / 366
» Implementing a Tamper-Evident Database System
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 10 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
IWMMDBMS
1998
91views more  IWMMDBMS 1998»
13 years 10 months ago
Q-L/MRP: A Buffer Management Mechanism for QoS Support in a Multimedia DBMS
Multimedia database systems (MMDBSs) have to be capable to handle efficiently time-dependent and timeindependent data, and to support Quality-of-Service (QoS). To support continuo...
Pål Halvorsen, Vera Goebel, Thomas Plagemann
BMCBI
2010
162views more  BMCBI 2010»
13 years 9 months ago
Moara: a Java library for extracting and normalizing gene and protein mentions
Background: Gene/protein recognition and normalization are important preliminary steps for many biological text mining tasks, such as information retrieval, protein-protein intera...
Mariana L. Neves, José María Carazo,...
WWW
2009
ACM
14 years 9 months ago
Collaborative filtering for orkut communities: discovery of user latent behavior
Users of social networking services can connect with each other by forming communities for online interaction. Yet as the number of communities hosted by such websites grows over ...
WenYen Chen, Jon-Chyuan Chu, Junyi Luan, Hongjie B...
HIPEAC
2009
Springer
14 years 3 months ago
Collective Optimization
Abstract. Iterative compilation is an efficient approach to optimize programs on rapidly evolving hardware, but it is still only scarcely used in practice due to a necessity to gat...
Grigori Fursin, Olivier Temam